Filters








7,469 Hits in 4.1 sec

Real-Time Intruder Tracing through Self-Replication [chapter]

Heejin Jang, Sangwook Kim
2002 Lecture Notes in Computer Science  
This paper proposes selfreplication mechanism, a new approach to real-time intruder tracing, minimizing a spatial limitation of traceable domain.  ...  It is impossible to respond to an attack which is done out of the security domain.  ...  Security Domain Extension for Real-Time Intruder Tracing In this section, we show that the security domain expands dynamically by the Self-Replication mechanism.  ... 
doi:10.1007/3-540-45811-5_1 fatcat:6aacttpffzbajnm5du2c2gvvwy

Efficient Malware Detection and Tracer Design for Operating System

A. Edwin Robert, M. Hemalatha
2013 Research Journal of Applied Sciences Engineering and Technology  
detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice.  ...  The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviours, where intruders represent processes and  ...  To follow the principle of complete mediation for building a security protection system, Tracer further restricts two extensive behaviours, called generic malware behaviours, to protect security more widely  ... 
doi:10.19026/rjaset.6.3823 fatcat:56lfvp7za5hajdeb2rrykhhm3i

Tracer

Zhiyong Shan, Xin Wang, Tzi-cker Chiueh
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
The model conceptually consists of three actions: detecting, tracing and restricting suspected intruders.  ...  One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system  ...  ., domain and type) of processes and files under the support of intrusion detection and tracing so as to improve usability.  ... 
doi:10.1145/1966913.1966932 dblp:conf/ccs/ShanWC11 fatcat:waok7lsumrdbzacya4t4gynoyy

SECURITY MECHANISM FOR MANETS

YASIR ABDELGADIR MOHAMED, AZWEEN B. ABDULLAH
2009 Journal of Engineering Science and Technology  
Even though immune-inspired approaches aren't essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates.  ...  Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.  ...  A protocol for securing mobile ad hoc networks based on the proposed architecture will be implemented.  ... 
doaj:9cfa90dcca2040aaa7f85864176cb2fd fatcat:ptlckaar6vbhfpo7g6vyygrdtq

Enforcing Mandatory Access Control in Commodity OS to Disable Malware

Zhiyong Shan, Xin Wang, Tzi-cker Chiueh
2012 IEEE Transactions on Dependable and Secure Computing  
The approach conceptually consists of three actions: detecting, tracing and restricting suspected intruders.  ...  The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables  ...  ., domain and type) of processes and files under the support of intrusion detection and tracing so as to improve usability.  ... 
doi:10.1109/tdsc.2012.36 fatcat:bkdmax2fe5c5ljek7rsd2vskfy

MarketNet

Y. Yemini, A. Dailianas, D. Florissi, G. Huberman
1998 Proceedings of the first international conference on Information and computation economies - ICE '98  
Currency carries unique identifiers, enabling a domain to pinpoint the sources of attacks.  ...  Currency also provides a resource-independent instrumentation to monitor and correlate access patterns and to detect intrusion attacks through automated, uniform statistical analysis of anomalous currency  ...  For example, to access any resources of the nested domain A, the intruder must still obtain sufficient currency of A.  ... 
doi:10.1145/288994.289032 fatcat:phj7kxmcgrcuzovwluy3ctlnba

Operational Semantics of Security Protocols [chapter]

Cas Cremers, Sjouke Mauw
2005 Lecture Notes in Computer Science  
Based on a concise domain analysis we develop a formal semantics of security protocols.  ...  Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly  ...  Security protocols: a domain analysis Rather than starting right away with the development of a formal semantics we first conduct a concise domain analysis.  ... 
doi:10.1007/11495628_4 fatcat:on7wme4fbvefxd3nblkabwdw4y

Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking

Bin Hu, Hamid Gharavi
2014 IEEE Transactions on Smart Grid  
Since both protocols utilize 4-way handshaking, we propose a Merkle-tree based handshaking scheme, which is capable of improving the resiliency of the network in a situation where an intruder carries a  ...  This paper introduces a dynamically updating key distribution strategy to enhance mesh network security against cyber attack.  ...  Through the use of a mesh key hierarchy EMSA is capable of establishing link security between two MPs in a wireless mesh network.  ... 
doi:10.1109/tsg.2013.2277963 fatcat:arsodsfwhbaupfuwc6wnoeiy6q

A Review on Wireless Network Security [chapter]

Sandeep Sharma, Rajesh Mishra, Karan Singh
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Therefore, many researchers are working in this hot area to secure the wireless communication. In this paper, we discuss the WEP, WPA, WPA2 and the RSA protocols and give the comparative study.  ...  Computer network is very essential part of our life by which we can share the information via different technologies such as wired or wireless.  ...  Because truly secure systems are not yet an achievable goal, we must be able to trace a security breach to a responsible party.  ... 
doi:10.1007/978-3-642-37949-9_58 fatcat:bjodudxaofad5giwyw5wim2zry

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

Mahdi Aiash
2012 International journal of network security and its applications  
However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes  ...  These methods will be extensively analysed in order to highlight their strengths and weaknesses.  ...  includes a DSRK and the new domain name.  ... 
doi:10.5121/ijnsa.2012.4413 fatcat:qg6ttn7a5venphdmrsmzmivete

Privacy protection in anonymous computational grid services

Debasish Jana, Amritava Chaudhuri, Bijan Bihari Bhaumik
2008 TENCON 2008 - 2008 IEEE Region 10 Conference  
An extension of onion routing has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity.  ...  Security issues for integrated and collaborative sharing of computing resources across heterogeneous administrative domains are principal concern.  ...  Acknowledgement The authors wish to thank the Department of Computer Science & Engineering of Jadavpur University for the facilities extended while conducting the implementation for this work in a simulated  ... 
doi:10.1109/tencon.2008.4766668 fatcat:guvn2drt7fhodcn7mqs6englwi

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

2014 KSII Transactions on Internet and Information Systems  
security.  ...  This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under  ...  The use of rank functions further improves protocol validation through tracing intruders' capabilities, and knowledge.  ... 
doi:10.3837/tiis.2014.12.021 fatcat:qw35jl7ov5gghgrfsuivk2tuki

Unauthorized Intrusions and Denial of Service [chapter]

Alan Boulanger
2010 Cybercrimes: A Multidisciplinary Analysis  
Armed with the domain name, the intruder then begins to search for more information through a number of different methods.  ...  Given that intrusion had been gained through an exploit on the WWW, the intruder will check the WWW server access log for records of previous intrusions and delete all traces of illicit activity.  ... 
doi:10.1007/978-3-642-13547-7_2 fatcat:7ohzuvqnrfd2tcmsx25fpyi4h4

Intrusion Detection in Agent-Based Virtual Knowledge Communities

Gabriel Opeyemi Ogunleye, ADEWALE OPEOLUWA OGUNDE
2010 Computer and Information Science  
Virtual Knowledge Communities (VKC) are current popular media on the internet through which the access and sharing of knowledge and information among communities of similar interest groups are made possible  ...  Recently, quite a number of works have been done on agent-based knowledge communities but most of these works have not actually considered the possibilities of intrusion and the consequences that these  ...  of attempts to secure computing systems through add-on or external means.  ... 
doi:10.5539/cis.v3n3p203 fatcat:tovpuv4tgvdhll3rmf2xwhuuzq

An integrated framework for security protocol analysis

Marcin Olszewski, Lukasz Cyra
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it.  ...  However, the formal methods can cover only a part of the scope of the problem.  ...  Security protocol modeling perspectives To help the users in using the proposed UML extension we provide a set of patterns.  ... 
doi:10.1145/1368310.1368325 dblp:conf/ccs/OlszewskiC08 fatcat:olcaky7rgzfshp7c7oz5xgx6me
« Previous Showing results 1 — 15 out of 7,469 results